nuclei-templates/http/misconfiguration/installer/call-com-installer.yaml

38 lines
939 B
YAML

id: call-com-installer
info:
name: Call.com Setup Page - Exposure
author: DhiyaneshDK
severity: high
description: |
Detects exposed Call.com Setup page.
reference:
- https://cal.com/
classification:
cpe: cpe:2.3:a:cal:cal.com:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: cal
product: cal.com
fofa-query: body="Setup | Cal.com"
tags: misconfig,install,exposure,cal
http:
- method: GET
path:
- "{{BaseURL}}/auth/setup"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Setup | Cal.com"
- "Minimum 15 characters long</li>"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402203f6587061930c10ffa8ff0e08fa66342d706d79c6dc9852b2cbd92a9fc261d5d022034ddd2f05f2578ac01e63ca5464999ef3a285a71cdf9eca58142b3b36b89bdc4:922c64590222798bb761d5b6d8e72950